Current P2P (overlay) networks have been designed with a focus on the construction of efficientmechanisms for the storage and retrieval of information among a community of participating nodes,with limited attention to the protection from malicious behaviors. The paper analyzes the attacks thatcan be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. Thepaper uses as a reference the Kademlia protocol, but the results are immediately applicable to most DHTnetworks.
(2005). ID mapping attacks in P2P networks [book chapter - capitolo di libro]. Retrieved from http://hdl.handle.net/10446/20586
ID mapping attacks in P2P networks
PARABOSCHI, Stefano;
2005-01-01
Abstract
Current P2P (overlay) networks have been designed with a focus on the construction of efficientmechanisms for the storage and retrieval of information among a community of participating nodes,with limited attention to the protection from malicious behaviors. The paper analyzes the attacks thatcan be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. Thepaper uses as a reference the Kademlia protocol, but the results are immediately applicable to most DHTnetworks.File allegato/i alla scheda:
Non ci sono file allegati a questa scheda.
Pubblicazioni consigliate
Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo